From f068041a18401b2ba1eb7b476cb0aad0fae7f4cd Mon Sep 17 00:00:00 2001 From: aggarwalakshun Date: Wed, 21 Jan 2026 05:12:51 +0530 Subject: [PATCH 1/6] Add external-resources namespace --- clusters/ipv6/external-resources/namespace.yml | 7 +++++++ 1 file changed, 7 insertions(+) create mode 100644 clusters/ipv6/external-resources/namespace.yml diff --git a/clusters/ipv6/external-resources/namespace.yml b/clusters/ipv6/external-resources/namespace.yml new file mode 100644 index 0000000..54c3ff0 --- /dev/null +++ b/clusters/ipv6/external-resources/namespace.yml @@ -0,0 +1,7 @@ +--- +kind: Namespace +apiVersion: v1 +metadata: + name: external-resources + labels: + name: external-resources -- 2.49.1 From 8d1dda3e9f324f9c62664f044a150c8ecff389f4 Mon Sep 17 00:00:00 2001 From: aggarwalakshun Date: Wed, 21 Jan 2026 05:12:59 +0530 Subject: [PATCH 2/6] Add ServersTransport configuration for insecure transport --- clusters/ipv6/external-resources/server-transport.yml | 8 ++++++++ 1 file changed, 8 insertions(+) create mode 100644 clusters/ipv6/external-resources/server-transport.yml diff --git a/clusters/ipv6/external-resources/server-transport.yml b/clusters/ipv6/external-resources/server-transport.yml new file mode 100644 index 0000000..e291164 --- /dev/null +++ b/clusters/ipv6/external-resources/server-transport.yml @@ -0,0 +1,8 @@ +--- +apiVersion: traefik.io/v1alpha1 +kind: ServersTransport +metadata: + name: insecure-transport + namespace: external-resources +spec: + insecureSkipVerify: true -- 2.49.1 From 1e9f1f9f48d76fc879e218ad14d25b976745ce5b Mon Sep 17 00:00:00 2001 From: aggarwalakshun Date: Wed, 21 Jan 2026 05:13:07 +0530 Subject: [PATCH 3/6] Add OMV endpoint, ingress, and service configurations --- .../external-resources/omv/omv-endpoint.yml | 13 +++++++++ .../external-resources/omv/omv-ingress.yml | 27 +++++++++++++++++++ .../ipv6/external-resources/omv/omv-svc.yml | 13 +++++++++ 3 files changed, 53 insertions(+) create mode 100644 clusters/ipv6/external-resources/omv/omv-endpoint.yml create mode 100644 clusters/ipv6/external-resources/omv/omv-ingress.yml create mode 100644 clusters/ipv6/external-resources/omv/omv-svc.yml diff --git a/clusters/ipv6/external-resources/omv/omv-endpoint.yml b/clusters/ipv6/external-resources/omv/omv-endpoint.yml new file mode 100644 index 0000000..6b8fec7 --- /dev/null +++ b/clusters/ipv6/external-resources/omv/omv-endpoint.yml @@ -0,0 +1,13 @@ +--- +apiVersion: v1 +kind: Endpoints +metadata: + name: omv + namespace: external-resources +subsets: + - addresses: + - ip: 192.168.1.4 + ports: + - name: http + protocol: TCP + port: 80 diff --git a/clusters/ipv6/external-resources/omv/omv-ingress.yml b/clusters/ipv6/external-resources/omv/omv-ingress.yml new file mode 100644 index 0000000..8961f7f --- /dev/null +++ b/clusters/ipv6/external-resources/omv/omv-ingress.yml @@ -0,0 +1,27 @@ +--- +apiVersion: networking.k8s.io/v1 +kind: Ingress +metadata: + name: omv-ingress + namespace: external-resources + annotations: + cert-manager.io/cluster-issuer: letsencrypt-cloudflare + traefik.ingress.kubernetes.io/router.middlewares: tools-authelia@kubernetescrd + traefik.ingress.kubernetes.io/router.entrypoints: websecure +spec: + ingressClassName: traefik + tls: + - hosts: + - omv.akshun-lab.cc + secretName: omv-tls + rules: + - host: omv.akshun-lab.cc + http: + paths: + - path: / + pathType: Prefix + backend: + service: + name: omv + port: + number: 80 diff --git a/clusters/ipv6/external-resources/omv/omv-svc.yml b/clusters/ipv6/external-resources/omv/omv-svc.yml new file mode 100644 index 0000000..d077328 --- /dev/null +++ b/clusters/ipv6/external-resources/omv/omv-svc.yml @@ -0,0 +1,13 @@ +--- +apiVersion: v1 +kind: Service +metadata: + name: omv + namespace: external-resources +spec: + ports: + - name: http + port: 80 + targetPort: 80 + protocol: TCP + clusterIP: None -- 2.49.1 From 75cca24afb22906979dfdc1bbb9214197f59f4ed Mon Sep 17 00:00:00 2001 From: aggarwalakshun Date: Wed, 21 Jan 2026 05:13:15 +0530 Subject: [PATCH 4/6] Add PBS endpoint, ingress, and service configurations --- .../external-resources/pbs/pbs-endpoint.yml | 13 +++++++++ .../external-resources/pbs/pbs-ingress.yml | 27 +++++++++++++++++++ .../ipv6/external-resources/pbs/pbs-svc.yml | 16 +++++++++++ 3 files changed, 56 insertions(+) create mode 100644 clusters/ipv6/external-resources/pbs/pbs-endpoint.yml create mode 100644 clusters/ipv6/external-resources/pbs/pbs-ingress.yml create mode 100644 clusters/ipv6/external-resources/pbs/pbs-svc.yml diff --git a/clusters/ipv6/external-resources/pbs/pbs-endpoint.yml b/clusters/ipv6/external-resources/pbs/pbs-endpoint.yml new file mode 100644 index 0000000..a2908b1 --- /dev/null +++ b/clusters/ipv6/external-resources/pbs/pbs-endpoint.yml @@ -0,0 +1,13 @@ +--- +apiVersion: v1 +kind: Endpoints +metadata: + name: pbs + namespace: external-resources +subsets: + - addresses: + - ip: 192.168.1.112 + ports: + - name: https + protocol: TCP + port: 8007 diff --git a/clusters/ipv6/external-resources/pbs/pbs-ingress.yml b/clusters/ipv6/external-resources/pbs/pbs-ingress.yml new file mode 100644 index 0000000..9fc0da0 --- /dev/null +++ b/clusters/ipv6/external-resources/pbs/pbs-ingress.yml @@ -0,0 +1,27 @@ +--- +apiVersion: networking.k8s.io/v1 +kind: Ingress +metadata: + name: pbs-ingress + namespace: external-resources + annotations: + cert-manager.io/cluster-issuer: letsencrypt-cloudflare + traefik.ingress.kubernetes.io/router.middlewares: tools-authelia@kubernetescrd + traefik.ingress.kubernetes.io/router.entrypoints: websecure +spec: + ingressClassName: traefik + tls: + - hosts: + - pbs.akshun-lab.cc + secretName: pbs-tls + rules: + - host: pbs.akshun-lab.cc + http: + paths: + - path: / + pathType: Prefix + backend: + service: + name: pbs + port: + number: 8007 diff --git a/clusters/ipv6/external-resources/pbs/pbs-svc.yml b/clusters/ipv6/external-resources/pbs/pbs-svc.yml new file mode 100644 index 0000000..167a1dd --- /dev/null +++ b/clusters/ipv6/external-resources/pbs/pbs-svc.yml @@ -0,0 +1,16 @@ +--- +apiVersion: v1 +kind: Service +metadata: + name: pbs + namespace: external-resources + annotations: + traefik.ingress.kubernetes.io/service.serversscheme: https + traefik.ingress.kubernetes.io/service.serverstransport: external-resources-insecure-transport@kubernetescrd +spec: + ports: + - name: https + port: 8007 + targetPort: 8007 + protocol: TCP + clusterIP: None -- 2.49.1 From 31f05ccacd5c3d1b799d45b84f028a0122de91ed Mon Sep 17 00:00:00 2001 From: aggarwalakshun Date: Wed, 21 Jan 2026 05:13:23 +0530 Subject: [PATCH 5/6] Add pihole endpoint, ingress, and service configurations --- .../pihole/pihole-endpoint.yml | 13 +++++++++ .../pihole/pihole-ingress.yml | 27 +++++++++++++++++++ .../external-resources/pihole/pihole-svc.yml | 13 +++++++++ 3 files changed, 53 insertions(+) create mode 100644 clusters/ipv6/external-resources/pihole/pihole-endpoint.yml create mode 100644 clusters/ipv6/external-resources/pihole/pihole-ingress.yml create mode 100644 clusters/ipv6/external-resources/pihole/pihole-svc.yml diff --git a/clusters/ipv6/external-resources/pihole/pihole-endpoint.yml b/clusters/ipv6/external-resources/pihole/pihole-endpoint.yml new file mode 100644 index 0000000..6595859 --- /dev/null +++ b/clusters/ipv6/external-resources/pihole/pihole-endpoint.yml @@ -0,0 +1,13 @@ +--- +apiVersion: v1 +kind: Endpoints +metadata: + name: pihole + namespace: external-resources +subsets: + - addresses: + - ip: 192.168.1.19 + ports: + - name: http + protocol: TCP + port: 80 diff --git a/clusters/ipv6/external-resources/pihole/pihole-ingress.yml b/clusters/ipv6/external-resources/pihole/pihole-ingress.yml new file mode 100644 index 0000000..4814f93 --- /dev/null +++ b/clusters/ipv6/external-resources/pihole/pihole-ingress.yml @@ -0,0 +1,27 @@ +--- +apiVersion: networking.k8s.io/v1 +kind: Ingress +metadata: + name: pihole-ingress + namespace: external-resources + annotations: + cert-manager.io/cluster-issuer: letsencrypt-cloudflare + traefik.ingress.kubernetes.io/router.middlewares: tools-authelia@kubernetescrd + traefik.ingress.kubernetes.io/router.entrypoints: websecure +spec: + ingressClassName: traefik + tls: + - hosts: + - pihole.akshun-lab.cc + secretName: pihole-tls + rules: + - host: pihole.akshun-lab.cc + http: + paths: + - path: / + pathType: Prefix + backend: + service: + name: pihole + port: + number: 80 diff --git a/clusters/ipv6/external-resources/pihole/pihole-svc.yml b/clusters/ipv6/external-resources/pihole/pihole-svc.yml new file mode 100644 index 0000000..bf78822 --- /dev/null +++ b/clusters/ipv6/external-resources/pihole/pihole-svc.yml @@ -0,0 +1,13 @@ +--- +apiVersion: v1 +kind: Service +metadata: + name: pihole + namespace: external-resources +spec: + ports: + - name: http + port: 80 + targetPort: 80 + protocol: TCP + clusterIP: None -- 2.49.1 From 2a1fa22faadd9df2494a4950c57258a2088cb145 Mon Sep 17 00:00:00 2001 From: aggarwalakshun Date: Wed, 21 Jan 2026 05:13:28 +0530 Subject: [PATCH 6/6] Add Proxmox endpoint, ingress, and service configurations --- .../proxmox/proxmox-endpoint.yml | 13 +++++++++ .../proxmox/proxmox-ingress.yml | 27 +++++++++++++++++++ .../proxmox/proxmox-svc.yml | 16 +++++++++++ 3 files changed, 56 insertions(+) create mode 100644 clusters/ipv6/external-resources/proxmox/proxmox-endpoint.yml create mode 100644 clusters/ipv6/external-resources/proxmox/proxmox-ingress.yml create mode 100644 clusters/ipv6/external-resources/proxmox/proxmox-svc.yml diff --git a/clusters/ipv6/external-resources/proxmox/proxmox-endpoint.yml b/clusters/ipv6/external-resources/proxmox/proxmox-endpoint.yml new file mode 100644 index 0000000..4ef59a2 --- /dev/null +++ b/clusters/ipv6/external-resources/proxmox/proxmox-endpoint.yml @@ -0,0 +1,13 @@ +--- +apiVersion: v1 +kind: Endpoints +metadata: + name: proxmox + namespace: external-resources +subsets: + - addresses: + - ip: 192.168.1.113 + ports: + - name: https + protocol: TCP + port: 8006 diff --git a/clusters/ipv6/external-resources/proxmox/proxmox-ingress.yml b/clusters/ipv6/external-resources/proxmox/proxmox-ingress.yml new file mode 100644 index 0000000..010e734 --- /dev/null +++ b/clusters/ipv6/external-resources/proxmox/proxmox-ingress.yml @@ -0,0 +1,27 @@ +--- +apiVersion: networking.k8s.io/v1 +kind: Ingress +metadata: + name: proxmox-ingress + namespace: external-resources + annotations: + cert-manager.io/cluster-issuer: letsencrypt-cloudflare + traefik.ingress.kubernetes.io/router.middlewares: tools-authelia@kubernetescrd + traefik.ingress.kubernetes.io/router.entrypoints: websecure +spec: + ingressClassName: traefik + tls: + - hosts: + - proxmox.akshun-lab.cc + secretName: proxmox-tls + rules: + - host: proxmox.akshun-lab.cc + http: + paths: + - path: / + pathType: Prefix + backend: + service: + name: proxmox + port: + number: 8006 diff --git a/clusters/ipv6/external-resources/proxmox/proxmox-svc.yml b/clusters/ipv6/external-resources/proxmox/proxmox-svc.yml new file mode 100644 index 0000000..60dd801 --- /dev/null +++ b/clusters/ipv6/external-resources/proxmox/proxmox-svc.yml @@ -0,0 +1,16 @@ +--- +apiVersion: v1 +kind: Service +metadata: + name: proxmox + namespace: external-resources + annotations: + traefik.ingress.kubernetes.io/service.serversscheme: https + traefik.ingress.kubernetes.io/service.serverstransport: external-resources-insecure-transport@kubernetescrd +spec: + ports: + - name: https + port: 8006 + targetPort: 8006 + protocol: TCP + clusterIP: None -- 2.49.1